SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Security & data privacy by design for new
applications development
Philippe Cornette
Partner
| 2
DigiTribe is an IT & business Consulting company
specialized in Digital enablement & execution
30+ Hands-on Experts & former C-level managers
3 Tribes: Cybersecurity, Digital enablement, Data Science
Customers: Large & Mid-sized organizations & Fintech
Mission
Bring innovation, relevant digital practices and start-
up mindset to large corporate organizations
| 32018 | DigiTribe | Confidential
63% of data breaches linked to a third-party component
56% of companies have experienced a 3rd-party breach in 2017
Data security laws and regulators increasingly require Banks & Insurance companies to perform sufficient
oversight of their third-party vendor’s data security protocols
By 2020, 75% of Fortune Global 500 companies will treat vendor risk management as a Board-level
initiative(Source: Gartner)
IOT, Open Banking APIs under PSD2, outsourcing, … and the FINTECHs create new risks & opportunities
EBA & NBB
“While staying behind and ignoring fintech is a real risk for banks, they should still tread carefully when
implementing fintech or, of course, any change. Banks should fully take into account the EBA’s 2018 “report on
the prudential risks and opportunities arising for institutions from fintech” when considering, implementing or
using fintech technologies, in the sense that they should take the necessary precautions to avoid, mitigate or
reduce certain risks.”
Why Financial institutions are increasing the number of
Information Security Due Diligences / TPSA ?
| 42018 | DigiTribe | Confidential
| 52018 | DigiTribe | Confidential
Reduce the risk of information security incidents
Ensure that their offerings are secure and dependable
Gain active assurance that suppliers are protecting their data
Comply with legal and policy requirements
Enable informed decision making when selecting new suppliers
What do your customers expect ?
| 62018 | DigiTribe | Confidential
Entry ticket for new contracts (Third-party assessment,
due diligence requirements)
Compliance (e.g. GDPR, NIS, PCI DSS,…)
Key differentiator / marketing advantages
Reduce costs of fixing bugs
Why security by design is important for the
Fintechs
| 72018 | DigiTribe | Confidential
Defense in Depth
| 82018 | DigiTribe | Confidential
System layers where security may be compromised
| 92018 | DigiTribe | Confidential
Software Security requirements
Security by Design principles
• Secure the weakest link
• Minimize attack surface area
• Establish secure defaults
• Principle of Least privilege
• Principle of Defense in depth
• Fail securely
• Don’t trust services
• Separation of duties
• Avoid security by obscurity
• Keep security simple
• Fix security issues correctly
• Promote privacy | 10
| 11
Secure SDLC
| 122018 | DigiTribe | Confidential
Requirements
• Do you gather security objectives?
• How are they mapped to the rest of the design process?
Design
• Does your team conduct security architecture and design reviews?
• Do you use checklists to drive the process? Do you revise them over time?
• Does your team create threat models to understand and prioritize risk?
Coding
• Does your team use a formalized set of security coding best practices?
• What type of code scanning tools do you use?
• Do you perform code reviews against security best practices?
Testing
• Does your team conduct 3rd party or internal penetration tests?
• Are your testers QA trained on the latest attack trends and test techniques?
• Do you use security testing tools?
Questions to ask yourself
Secure coding
Secure Coding
Secure software does not happen by itself. It requires consistently applied
methodologies across the organization
Securing coding is the practice of developing computer software in a way that
guards against the accidental introduction of security vulnerabilities. Defects, bugs
and logic flaws are consistently the primary cause of commonly exploited software
vulnerabilities.
This includes acceptance tests for third-parties code (e.g. : libraries downloaded
from internet)
| 152018 | DigiTribe | Confidential
The importance of knowing how to code with style… guide
| 162018 | DigiTribe | Confidential
Coding Standards Benefits
• Code Clarity/Easier to Understand
• Easier to Maintain
• Reduces Bugs
• Simplifies Code Reviews
• Shorter learning curve for new team members
• Consistency across large and distributed teams
• Comply with internal or regulatory quality initiatives
Business Benefits
• Improve software quality
• Accelerate time to market
• Enhance customer satisfaction
• Reduce long term cost
• Improve productivity
Coding Style guide
| 182018 | DigiTribe | Confidential
Component
• The average application consists of 106 open source components.
Vulnerability
• A typical application contains 23 known vulnerabilities.
License
• Most applications indicate at least 8 GPL licensed components.
Architecture
• Many components in use are old, unsupported, and unpopular.
The need for open source security management became front-page news in 2017
owing to a major data breach at Equifax (Consumer credit rating agency).
The breach (due to a Apache Struts security hole) has compromised the information
of over 148 million U.S. consumers, nearly 700,000 U.K. residents, and more than
19,000 Canadian customers.
Open Source Security
Open source, Libraries and Frameworks: Best Practices
• Use libraries and frameworks from trusted sources actively maintained and
widely used.
• Create and maintain an inventory catalogue of all the third party libraries.
• Proactively keep libraries and components up to date; use tools, like OWASP
Dependency Check, Retire.JS, to identify project dependencies and check if
there are known, publicly disclosed vulnerabilities for all third party code.
• Reduce the attack surface by encapsulating the library and expose only the
required behaviour into your software.
• Manage your technical debt
• Create a concise Open Source Security Policy
| 202018 | DigiTribe | Confidential
| 212018 | DigiTribe | Confidential
Risk, Cybersecurity & GDPR assessment & gap analysis
(ISO27001, NIST, SWIFT CSP, GDPR,…)
IT Strategy, architecture and governance
Cybersecurity strategy, roadmap & implementation
CISO & DPO as a service
Support to answer TPSA
Third-party assessment of your suppliers
Partnership on solutions with our customers
Second opinion as a service
What can Digitribe do for you ?
To contact us
www.digitribe.be philippe.cornette@digitribe.be +32 478403012
| 222018 | DigiTribe | Confidential

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework CimetricsCybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework CimetricsCimetrics Inc
 
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...Mindtree Ltd.
 
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...Andris Soroka
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityBob Guimarin
 
Cybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect CimetricsCybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect CimetricsCimetrics Inc
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesDenim Group
 
Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Ollie Whitehouse
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist PriyaNemade
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity AssessmentDoreen Loeber
 
Driving IT Transformation with Agile Analytics
Driving IT Transformation with Agile AnalyticsDriving IT Transformation with Agile Analytics
Driving IT Transformation with Agile AnalyticsBit Stew Systems
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challengesHadi Fadlallah
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?Nixu Corporation
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Black Duck by Synopsys
 
Solving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine IntelligenceSolving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine IntelligenceBit Stew Systems
 
How digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabHow digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabArgelich Networks
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksYokogawa1
 
CWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCapgemini
 

Was ist angesagt? (18)

Cybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework CimetricsCybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework Cimetrics
 
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
 
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
Cybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect CimetricsCybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect Cimetrics
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
 
Driving IT Transformation with Agile Analytics
Driving IT Transformation with Agile AnalyticsDriving IT Transformation with Agile Analytics
Driving IT Transformation with Agile Analytics
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Solving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine IntelligenceSolving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine Intelligence
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
How digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabHow digital technology is shaping the future of marthab
How digital technology is shaping the future of marthab
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
CWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurity
 

Ähnlich wie Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornette - Digitribe - 18-12-18

Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...Mindtree Ltd.
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
 
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...Prasanna Hegde
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
DACHNUG50 BigFix NIS2.pdf
DACHNUG50 BigFix NIS2.pdfDACHNUG50 BigFix NIS2.pdf
DACHNUG50 BigFix NIS2.pdfDNUG e.V.
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsLionel Briand
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewSuzanne Livingston
 
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty ComputationISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty ComputationUlfMattsson7
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsZeshan Sattar
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Chris neely the future of cyber security events 3
Chris neely the future of cyber security   events 3Chris neely the future of cyber security   events 3
Chris neely the future of cyber security events 3Redazione InnovaPuglia
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 

Ähnlich wie Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornette - Digitribe - 18-12-18 (20)

Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
DACHNUG50 BigFix NIS2.pdf
DACHNUG50 BigFix NIS2.pdfDACHNUG50 BigFix NIS2.pdf
DACHNUG50 BigFix NIS2.pdf
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech Applications
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services Overview
 
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty ComputationISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Chris neely the future of cyber security events 3
Chris neely the future of cyber security   events 3Chris neely the future of cyber security   events 3
Chris neely the future of cyber security events 3
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 

Mehr von FinTech Belgium

Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumFinTech Belgium
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdfFinTech Belgium
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptxFinTech Belgium
 
Pitch Ogloba Feb 2nd 2024 .pptx
Pitch Ogloba Feb 2nd 2024           .pptxPitch Ogloba Feb 2nd 2024           .pptx
Pitch Ogloba Feb 2nd 2024 .pptxFinTech Belgium
 
20240315 _E-Invoicing Digiteal. .pptx
20240315 _E-Invoicing Digiteal.    .pptx20240315 _E-Invoicing Digiteal.    .pptx
20240315 _E-Invoicing Digiteal. .pptxFinTech Belgium
 
04_Gambit_Laurent Bodson. .pptx
04_Gambit_Laurent Bodson.          .pptx04_Gambit_Laurent Bodson.          .pptx
04_Gambit_Laurent Bodson. .pptxFinTech Belgium
 
03_Discai_Dagmar Schouterden. .pdf
03_Discai_Dagmar Schouterden.       .pdf03_Discai_Dagmar Schouterden.       .pdf
03_Discai_Dagmar Schouterden. .pdfFinTech Belgium
 
01_DLA Piper_Nicolas Kalokyris. .pptx
01_DLA Piper_Nicolas Kalokyris.    .pptx01_DLA Piper_Nicolas Kalokyris.    .pptx
01_DLA Piper_Nicolas Kalokyris. .pptxFinTech Belgium
 
00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptxFinTech Belgium
 
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdfFinTech Belgium
 
Fintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdfFintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdfFinTech Belgium
 
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptxFinTech Belgium
 
AMS_04 Toon Daenen. .pptx
AMS_04 Toon Daenen.                .pptxAMS_04 Toon Daenen.                .pptx
AMS_04 Toon Daenen. .pptxFinTech Belgium
 
AMS_03 François De Witte_. .pptx
AMS_03 François De Witte_.         .pptxAMS_03 François De Witte_.         .pptx
AMS_03 François De Witte_. .pptxFinTech Belgium
 
AMS_01_Rie_.De Sordo Cock pptx
AMS_01_Rie_.De Sordo Cock           pptxAMS_01_Rie_.De Sordo Cock           pptx
AMS_01_Rie_.De Sordo Cock pptxFinTech Belgium
 
AMS_00 FTBE_0126_2024. .pptx
AMS_00 FTBE_0126_2024.             .pptxAMS_00 FTBE_0126_2024.             .pptx
AMS_00 FTBE_0126_2024. .pptxFinTech Belgium
 
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdfS5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdfFinTech Belgium
 

Mehr von FinTech Belgium (20)

Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
Pitch Ogloba Feb 2nd 2024 .pptx
Pitch Ogloba Feb 2nd 2024           .pptxPitch Ogloba Feb 2nd 2024           .pptx
Pitch Ogloba Feb 2nd 2024 .pptx
 
20240315 _E-Invoicing Digiteal. .pptx
20240315 _E-Invoicing Digiteal.    .pptx20240315 _E-Invoicing Digiteal.    .pptx
20240315 _E-Invoicing Digiteal. .pptx
 
04_Gambit_Laurent Bodson. .pptx
04_Gambit_Laurent Bodson.          .pptx04_Gambit_Laurent Bodson.          .pptx
04_Gambit_Laurent Bodson. .pptx
 
03_Discai_Dagmar Schouterden. .pdf
03_Discai_Dagmar Schouterden.       .pdf03_Discai_Dagmar Schouterden.       .pdf
03_Discai_Dagmar Schouterden. .pdf
 
01_DLA Piper_Nicolas Kalokyris. .pptx
01_DLA Piper_Nicolas Kalokyris.    .pptx01_DLA Piper_Nicolas Kalokyris.    .pptx
01_DLA Piper_Nicolas Kalokyris. .pptx
 
00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx
 
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
 
Fintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdfFintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdf
 
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
 
AMS_04 Toon Daenen. .pptx
AMS_04 Toon Daenen.                .pptxAMS_04 Toon Daenen.                .pptx
AMS_04 Toon Daenen. .pptx
 
AMS_03 François De Witte_. .pptx
AMS_03 François De Witte_.         .pptxAMS_03 François De Witte_.         .pptx
AMS_03 François De Witte_. .pptx
 
AMS_01_Rie_.De Sordo Cock pptx
AMS_01_Rie_.De Sordo Cock           pptxAMS_01_Rie_.De Sordo Cock           pptx
AMS_01_Rie_.De Sordo Cock pptx
 
AMS_00 FTBE_0126_2024. .pptx
AMS_00 FTBE_0126_2024.             .pptxAMS_00 FTBE_0126_2024.             .pptx
AMS_00 FTBE_0126_2024. .pptx
 
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdfS5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
 

Kürzlich hochgeladen

VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Strategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationStrategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationAdnet Communications
 
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...Henry Tapper
 
Toronto dominion bank investor presentation.pdf
Toronto dominion bank investor presentation.pdfToronto dominion bank investor presentation.pdf
Toronto dominion bank investor presentation.pdfJinJiang6
 
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Pension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfPension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfHenry Tapper
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Pooja Nehwal
 
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...priyasharma62062
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
 
Q1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfQ1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfAdnet Communications
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Availabledollysharma2066
 
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7jayawati511
 
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...dipikadinghjn ( Why You Choose Us? ) Escorts
 

Kürzlich hochgeladen (20)

VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
 
Strategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationStrategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate Presentation
 
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
 
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
 
Toronto dominion bank investor presentation.pdf
Toronto dominion bank investor presentation.pdfToronto dominion bank investor presentation.pdf
Toronto dominion bank investor presentation.pdf
 
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
 
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
 
Pension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfPension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdf
 
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
 
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
Q1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfQ1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdf
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
 
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
 
W.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdfW.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdf
 
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
 
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
 

Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornette - Digitribe - 18-12-18

  • 1. Security & data privacy by design for new applications development Philippe Cornette Partner
  • 2. | 2 DigiTribe is an IT & business Consulting company specialized in Digital enablement & execution 30+ Hands-on Experts & former C-level managers 3 Tribes: Cybersecurity, Digital enablement, Data Science Customers: Large & Mid-sized organizations & Fintech Mission Bring innovation, relevant digital practices and start- up mindset to large corporate organizations
  • 3. | 32018 | DigiTribe | Confidential 63% of data breaches linked to a third-party component 56% of companies have experienced a 3rd-party breach in 2017 Data security laws and regulators increasingly require Banks & Insurance companies to perform sufficient oversight of their third-party vendor’s data security protocols By 2020, 75% of Fortune Global 500 companies will treat vendor risk management as a Board-level initiative(Source: Gartner) IOT, Open Banking APIs under PSD2, outsourcing, … and the FINTECHs create new risks & opportunities EBA & NBB “While staying behind and ignoring fintech is a real risk for banks, they should still tread carefully when implementing fintech or, of course, any change. Banks should fully take into account the EBA’s 2018 “report on the prudential risks and opportunities arising for institutions from fintech” when considering, implementing or using fintech technologies, in the sense that they should take the necessary precautions to avoid, mitigate or reduce certain risks.” Why Financial institutions are increasing the number of Information Security Due Diligences / TPSA ?
  • 4. | 42018 | DigiTribe | Confidential
  • 5. | 52018 | DigiTribe | Confidential Reduce the risk of information security incidents Ensure that their offerings are secure and dependable Gain active assurance that suppliers are protecting their data Comply with legal and policy requirements Enable informed decision making when selecting new suppliers What do your customers expect ?
  • 6. | 62018 | DigiTribe | Confidential Entry ticket for new contracts (Third-party assessment, due diligence requirements) Compliance (e.g. GDPR, NIS, PCI DSS,…) Key differentiator / marketing advantages Reduce costs of fixing bugs Why security by design is important for the Fintechs
  • 7. | 72018 | DigiTribe | Confidential Defense in Depth
  • 8. | 82018 | DigiTribe | Confidential System layers where security may be compromised
  • 9. | 92018 | DigiTribe | Confidential Software Security requirements
  • 10. Security by Design principles • Secure the weakest link • Minimize attack surface area • Establish secure defaults • Principle of Least privilege • Principle of Defense in depth • Fail securely • Don’t trust services • Separation of duties • Avoid security by obscurity • Keep security simple • Fix security issues correctly • Promote privacy | 10
  • 12. | 122018 | DigiTribe | Confidential Requirements • Do you gather security objectives? • How are they mapped to the rest of the design process? Design • Does your team conduct security architecture and design reviews? • Do you use checklists to drive the process? Do you revise them over time? • Does your team create threat models to understand and prioritize risk? Coding • Does your team use a formalized set of security coding best practices? • What type of code scanning tools do you use? • Do you perform code reviews against security best practices? Testing • Does your team conduct 3rd party or internal penetration tests? • Are your testers QA trained on the latest attack trends and test techniques? • Do you use security testing tools? Questions to ask yourself
  • 14. Secure Coding Secure software does not happen by itself. It requires consistently applied methodologies across the organization Securing coding is the practice of developing computer software in a way that guards against the accidental introduction of security vulnerabilities. Defects, bugs and logic flaws are consistently the primary cause of commonly exploited software vulnerabilities. This includes acceptance tests for third-parties code (e.g. : libraries downloaded from internet)
  • 15. | 152018 | DigiTribe | Confidential The importance of knowing how to code with style… guide
  • 16. | 162018 | DigiTribe | Confidential Coding Standards Benefits • Code Clarity/Easier to Understand • Easier to Maintain • Reduces Bugs • Simplifies Code Reviews • Shorter learning curve for new team members • Consistency across large and distributed teams • Comply with internal or regulatory quality initiatives Business Benefits • Improve software quality • Accelerate time to market • Enhance customer satisfaction • Reduce long term cost • Improve productivity Coding Style guide
  • 17.
  • 18. | 182018 | DigiTribe | Confidential Component • The average application consists of 106 open source components. Vulnerability • A typical application contains 23 known vulnerabilities. License • Most applications indicate at least 8 GPL licensed components. Architecture • Many components in use are old, unsupported, and unpopular. The need for open source security management became front-page news in 2017 owing to a major data breach at Equifax (Consumer credit rating agency). The breach (due to a Apache Struts security hole) has compromised the information of over 148 million U.S. consumers, nearly 700,000 U.K. residents, and more than 19,000 Canadian customers. Open Source Security
  • 19. Open source, Libraries and Frameworks: Best Practices • Use libraries and frameworks from trusted sources actively maintained and widely used. • Create and maintain an inventory catalogue of all the third party libraries. • Proactively keep libraries and components up to date; use tools, like OWASP Dependency Check, Retire.JS, to identify project dependencies and check if there are known, publicly disclosed vulnerabilities for all third party code. • Reduce the attack surface by encapsulating the library and expose only the required behaviour into your software. • Manage your technical debt • Create a concise Open Source Security Policy
  • 20. | 202018 | DigiTribe | Confidential
  • 21. | 212018 | DigiTribe | Confidential Risk, Cybersecurity & GDPR assessment & gap analysis (ISO27001, NIST, SWIFT CSP, GDPR,…) IT Strategy, architecture and governance Cybersecurity strategy, roadmap & implementation CISO & DPO as a service Support to answer TPSA Third-party assessment of your suppliers Partnership on solutions with our customers Second opinion as a service What can Digitribe do for you ?
  • 22. To contact us www.digitribe.be philippe.cornette@digitribe.be +32 478403012 | 222018 | DigiTribe | Confidential

Hinweis der Redaktion

  1. Use libraries and frameworks from trusted sources that are actively maintained and widely used by many applications. Create and maintain an inventory catalogue of all the third party libraries. Proactively keep libraries and components up to date. Use tools to identify project dependencies and check if there are any known, publicly disclosed vulnerabilities for all third party code, like: OWASP Dependency Check Retire.JS. Reduce the attack surface by encapsulating the library and expose only the required behaviour into your software